Well, this is great news.. The FBI has arrested ‘several’ ‘botherders. These are the people who use malicious software to gain control of home, business and institutional computers. Their task is made easier by the millions of small businesses and home users who do not keep their computers adequately secured. Continue reading
I just got back from a client with a home office. We had some nasty thunderstorms and it appears that the juice from a close hit travelled through their cable. It blew the cable modem, the linksys router and the onboard Nic for one of the two machines.
Here are a couple of thoughts on this.. Continue reading
It’s an old book but I’ve found that it is still very relevant today. It’s Cliff Stoll’s “The Cuckoo’s Egg”..
Stoll was an Astronomy Professor at Berkley who was put in charge of the computer department. He noticed a 75 cent discrepancy in the billing. As he investigated, he found that a hacker was using the school’s system to break into some of the most sensitive computer installations in the county. Continue reading
Google has a neat tool available called Google Trends. http://www.google.com/trends You can put in a search term or terms and it will show you the historical trends for searches for that term. It will also highlight news articles pertaining to that term and when they appeared.
You can also put in multiple terms to compare seperated by commas. Continue reading
You can run into a problem when sending large files via email. The problem is that many accounts are still limited to about 20MB for their inboxes. Suppose you have 3 files you want to send to one person who has a 20MB cap on their inbox. Each file is 8MB. You can email the first 2 ok, however the third will probably bounce because it would exceed the mailbox limit. Continue reading
Depending on where you live, how busy the local cops and prosecuter are, and your overall luck, freeloading on an open wifi connection could cost you dearly.
A guy in Michigan was spotted using a local cafe’s wireless. From the description, it doesn’t sound like he was a bad guy – volunteer firefighter, secretary for a bagpipe band.. It also sounds like the cafe owner wasn’t all that worried about the access. Continue reading
itunes hiding personal data
It appears that at least your name and email address get embedded in itunes files you download from Apples iTunes Plus.
Suggestions Continue reading
Google is now showing 360 degree street level views. It’s great from the perspective of showing people exactly how a particular location looks. However, the problem is that it is showing individual recognizable people. I’m not sure how Google is able to do this. I’m not an attorney so I don’t know the exact laws. However, most things I read indicate that you need to have a model release any time you publish a photograph of a recognizable person or persons. Continue reading
Uh-oh – If you are running certain extensions with Firefox, you could be vulnerable to hacking. According to the story below, the vulnerablity comes into play in a wireless environment or if your wired router still has the default passwords. Continue reading
Well, Google is finally cracking down on MFAs and the federales are busting spammers.. Life is starting to look rosier
What I don’t get in the article is that he sent tens of millions of spams and the prosecutors are trying to seize 770k. For some reason, that doesn’t seem like a lot of profit considering how much spam he is accused of sending. Continue reading